Gartner says 4.9 billion connected "things" will be in use in 2015, p.28, 2014. ,
Lessons from the dyn ddos attack, 2016. ,
Breaking down mirai: An iot ddos botnet analysis, p.29, 2016. ,
Target hackers broke in via hvac company, p.29, 2014. ,
La sécuritésécurité`sécuritéà l'` ere des objets connectés: comment s'y prendre, Workshop "Sécurité des Objets Connectés, 2017. ,
, Hp study reveals 70 percent of internet of things devices vulnerable to attack, HP, vol.20, 2014.
, R` eglement général sur la protection des données, pp.32016-0679, 2016.
Proposed security model and threat taxonomy for the internet of things (iot), pp.420-429, 2010. ,
Internet of things: a definition & taxonomy, Next Generation Mobile Applications, Services and Technologies, pp.72-77, 2015. ,
Insecurity in the internet of things, Security Response, 2015. ,
Amazon key security: Cloudcam subject to disruption attacks, p.29, 2017. ,
Security threats in zigbee-enabled systems: vulnerability evaluation, practical experiments, countermeasures, and lessons learned, 46th Hawaii International Conference on, pp.5132-5138, 2013. ,
Key reinstallation attacks: Forcing nonce reuse in wpa2, Proceedings of the ACM Conference on Computer and Communications Security, vol.30, 2017. ,
Iot for kids: Cayla doll exploit, p.29, 2017. ,
Internet of things: Vision, applications and research challenges, Ad Hoc Networks, vol.10, issue.7, pp.1497-1516, 2012. ,